Continuous Monitoring and its Effect on Change Control



Similar documents
Patch and Vulnerability Management Program

NMS300 Network Management System

Error and Event Log Messages

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

GE Measurement & Control. Cyber Security for NEI 08-09

Network Load Balancing

VoIP Intercom with Allworx 6x Server Setup Guide

Implementing Cisco IOS Network Security

Securing Cisco Network Devices (SND)

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

IPv6 First Hop Security Protecting Your IPv6 Access Network

Cisco Certified Security Professional (CCSP)

Configuring DHCP Snooping

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation

VoIP Ceiling Speaker with Allworx 6x Server Setup Guide

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

Implementing Cisco IOS Network Security v2.0 (IINS)

v7.8.2 Release Notes for Websense Content Gateway

Insightix Discovery & NAC. Lite Edition. Installation Guide. Version 3.0. May United States. International 945 Concord St.

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

IINS Implementing Cisco Network Security 3.0 (IINS)

Name. Description. Rationale

Print Audit Facilities Manager Technical Overview

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.

Patch Management. Module VMware Inc. All rights reserved

GRAVITYZONE HERE. Deployment Guide VLE Environment

IntraVUE Plug Scanner/Recorder Installation and Start-Up

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Network Monitoring with SNMP

Goals. Understanding security testing

Cybersecurity Health Check At A Glance

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

CTS2134 Introduction to Networking. Module Network Security

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

The Campus NMS tool NAV GN3 Network monitoring workshop Belgrade, 20th October 2009 Morten Brekkevold

5 FAM 860 HARDWARE AND SOFTWARE MAINTENANCE

[D-View 7 Advanced Hands-On Practice] Version 1.0

Simple Network Management Protocol

Installation Runbook for F5 Networks BIG-IP LBaaS Plugin for OpenStack Kilo

RPM Utility Software. User s Manual

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Critical Controls for Cyber Security.

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Vistara Lifecycle Management

4. Getting started: Performing an audit

How To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet (Network Monitor) On An Ip

Network Security Guidelines. e-governance

Vmware VSphere 6.0 Private Cloud Administration

TABLE OF CONTENTS NETWORK SECURITY 2...1

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Network Monitoring with SNMP

How To Monitor Your Entire It Environment

Using WhatsUp IP Address Manager 1.0

WhatsUp Gold v11 Features Overview

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

STREAM FRBC

vrealize Operations Manager Customization and Administration Guide

WhatsUp Gold vs. Orion

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

MSP Center Plus Features Checklist

Tracking Network Changes Using Change Audit

SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

IBM Security QRadar SIEM Version MR1. Log Sources User Guide

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

Using SNMP with Content Gateway (not V-Series)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Office of Inspector General

How To Understand and Configure Your Network for IntraVUE

Network Troubleshooting & Configuration in vsphere VMware Inc. All rights reserved

COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar

Parallels Mac Management v4.0

Cisco Change Management: Best Practices White Paper

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

vcenter Support Assistant User's Guide

CNE Network Assessment

Management, Logging and Troubleshooting

Skybot Scheduler Release Notes

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

Centerity Monitor. Technical Guide: Centerity VCE VBlock Monitoring V6.15

WhatsUp Gold v11 Features Overview

ADM:49 DPS POLICY MANUAL Page 1 of 5

A Guide to Understanding SNMP

VMware vsphere: [V5.5] Admin Training

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

Transcription:

Continuous Monitoring and its Effect on Change Control Dr. Nathaniel Evans Dr. William Horsthemke Nathan Rinsema Matthew Scialabba Argonne National Laboratory

Agenda Introduction Goals Overview of continuous monitoring Overview of paper-driven Certification and Authority (C&A) process Overview of paper-driven Change Control Board (CCB) process How continuous monitoring affects C&A process How continuous monitoring affects CCB process A technical example we have implemented Conclusion 2

Goals To show the positive effect that continuous monitoring will have on a variety of traditional security exercises, including the C&A process and the CCB process, which are generally paper based. As a note, the majority of our experience is in the Department of Homeland Security (DHS) world. The Department of Energy (DOE) may be slightly different, but we plan to speak in generics as much as possible. 3

Continuous Monitoring There are three parts to a continuous monitoring system: 1. Continuous audit Inventory and patch management 2. Continuous controls monitoring Configuration management 3. Continuous transaction inspection Scanning, network-level monitoring, tracking, and alerting 4

Certification and Authorization Process At intervals of several years, facilities must undergo a C&A process to confirm that: All machines are patched All configurations are set up and documented The network architecture makes sense This is normally done through a paperwork exercise consisting of the following: Site Security Plan (SSP) Requirements Traceability Matrix (RTM) Security Testing and Evaluation (ST&E) Contingency Plan (CP) and Test (CPT) Risk Assessment (RA) Security Assessment Report (SAR) 5

Change Control Board Process Documentation-driven If change requires editing documentation, the Change Request must be approved by the CCB Change Requests are written and illustrated. They require pre-approval before submittal to CCB. After submittal, they are Reviewed by CCB Discussed with CCB Approved or rejected by CCB CCB can consists of a variety of individuals who have authority over certain aspects of the systems. These may include the following: Enterprise architecture Security Program management 6

Continuous Monitoring Affects Certification and Authority (Your Authority to Operate) SSP needed once; update accordingly Inventory monitored continuously, so no longer needed Configurations monitored continuously, so no longer needed RTM no longer needed; controlled through change management and verified through change control software Contingency Plan updated and performed annually ST&E done continuously to evaluate against controls, so document is no longer needed Risk Assessment and SAR no longer needed; scans are done continuously and risk is analyzed during change control Continuous monitoring has allowed us to theoretically eliminate two documents and reduce the need to continually update and get approval on the other two 7

Continuous Monitoring Affects CCB Approval required for changes in kind, not in scale Addition of new types of systems, networks, services, or external interconnections New = types not already approved for use Approval not required for addition of technologies similar to those already approved Approval required for substantial changes to architecture Re-organization of multiple systems or networks Changes that alter the ability to observe the change Change in access control policy or types of user Policy changes in general are difficult to monitor or track 8

Now for the technical stuff An Example 9

Controls Monitoring - Configuration Management Network gear Record history of configuration Full configuration files Initial (a previous) Current All modifications since initial Record notification of configuration changes Simple Network Management Protocol (SNMP) Inform trap Correlate change with on-device change log history if necessary Record configuration changes Difference (diff) between new and current configuration files Replace current with new Retain all differences (option to purge if excessive) 10

Audit - Inventory Management All approved devices are members of Authorized-Devices Database Certified and Accredited Devices {C&A} {Authorized Devices} Device discovery Alert if not approved Mac Address {Authorized Devices} Ease database update if approved by authorized administrator Verify complete inventory for continuous monitoring tasks {Task Inventory} {C&A} and {C&A} {Task Inventory} {Availability and Performance Monitoring} {Vulnerability Assessment} {Property} {Patch Management} 11

Transaction Inspection - Network-Level Monitoring Network infrastructure and configuration SNMP Get (periodic query) Event-level information from network gear SNMP Informs (traps with acknowledgement) Information Device (MAC) {Switch, Port, VLAN,IP address} Interface {Attached-devices, status (up/down, admin)} Configuration of network gear Capabilities (port count) and settings 12

Transaction Inspection - Tracking and Alerts MAC, Interface, ARP History Device (MAC) discovery Alert if not approved - Mac Address {Authorized Devices} Device History Δ {Port, Switch, VLAN, IP Address} Alert-able Δ Physical Host of Virtual Machine (VM) Alert if VM outside approved VM cluster (Administrative move of VM) Interface Modification External (connect/disconnect) Internal configuration change (admin up/down) 13

Overall Process and Database 14

Overall Process and Database 15

Trap Processing 16

System Configuration Server Software Configuration: snmptrapd listening on port 162 Specific SNMP inform user created User granted log and execute permissions Default trap handle calls trap.sh Network Hardware Configuration: SNMPv3 inform user MAC address add, remove, or change Configuration change Interface status change: up, down, administratively down Global Configuration Assumptions: Using SNMPv3 A fully privileged database user and password The database does NOT need to be listening on the network if run locally Dummy ASA user and password ASA authorization limiting a dummy ASA user to defined commands 17

System Specifications Software Versions: CentOS 5.8 x86_64 Kernel 2.6.18-308.1.1.el5 Python Version python-2.4.3-46.el5 python-pgsql-0.9.7-1.el5 Perl Version perl-5.8.8-38.el5 perl-dbi-1.52-2.el5 perl-net-snmp-5.2.0-1.el5.1 Net-SNMP Version net-snmp-5.3.2.2-17.el5 Network hardware: Cisco 2960(G) IOS Version 12.2(53)SE1 Cisco 6000 IOS Version 12.2(33)SXI3 Cisco 4900 IOS Version 12.2(50)SG1 Cisco ASA 55xx IOS Version *does not update continuously to network_monitor.py 18

Goal and Objective Validate the sensitivity of a continuous monitoring methodology Detects all substantial changes Inventory Services Connectivity Verifies status Vulnerability Patch Objective: Create trustworthy signature for security of C&A system 19

That s it Questions?? 21